Search results

(121 - 140 of 171)

Pages

Achieve secure communications for mobile crowd sourcing applications
Authorship attribution in the dark web
Investigating suspected background processes in Android malware classification through dynamic automated reverse engineering and semi-automated debugging
Investigation of the linear node movement patterns in wireless networks
High performance Python through workload acceleration with OMR JitBuilder
Investigation of encrypted and obfuscated network traffic utilizing machine learning
Domain generation algorithm (DGA) detection
Efficient and privacy-preserving AdaBoost classification framework for mining healthcare data over outsourced cloud
MicroJIT: a template-based Just-in-Time compiler for constrained environments
Ahead-of-time compilation of WebAssembly using Eclipse OMR
Understanding the factors that influence user adoption of e-banking services in developing countries (a case study of Nigeria)
Tree structured data processing on GPUs
Business Rules Interoperation
A semi-automated security assessment framework for wearable health monitoring devices
Characteristics of mental representations in novices and experts in Java
TelePhysio+
Contextualized embeddings encode knowledge of English verb-noun combination idiomaticity
Graph-based IoT malware family classification
On the evaluation of adversarial vulnerabilities of deep neural networks
Preserving consumer DNA privacy for finding relatives in a malicious two party computation

Pages

Zircon - This is a contributing Drupal Theme
Design by WeebPal.